☆20Jan 20, 2023Updated 3 years ago
Alternatives and similar repositories for wazuh-misp
Users that are interested in wazuh-misp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Oct 20, 2021Updated 4 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- ☆41Aug 26, 2023Updated 2 years ago
- ☆20Oct 17, 2021Updated 4 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- IRIS Module for Wazuh-Indexer Searching☆11Nov 24, 2023Updated 2 years ago
- Personal scripts☆15Sep 11, 2024Updated last year
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 5 months ago
- A configuration to allow Wazuh to communicate with ChatGPT, based on https://loggar.hashnode.dev/augmenting-wazuh-with-chatgpt-integratio…☆24Mar 20, 2023Updated 3 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆72Jul 21, 2021Updated 4 years ago
- Wazuh integration TheHive☆41Feb 21, 2023Updated 3 years ago
- Audit utility for STIG compliance utilizing PowerSTIG DSC☆19Oct 9, 2023Updated 2 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- Zabbix Templates and scripts to monitor OSSEC or Wazuh Manager Intrusion Detection☆14Sep 18, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- ☆14Aug 15, 2023Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- php IBSng remote web API☆13Mar 24, 2016Updated 10 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆39Jun 8, 2020Updated 5 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Awesome Cyber-Security Data-sets Collection☆22Aug 30, 2018Updated 7 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,264Mar 11, 2026Updated 2 weeks ago
- Sample code on using Firewalla MSP API☆22Jun 27, 2025Updated 9 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆20Mar 9, 2026Updated 2 weeks ago
- MISP website (hugo-based)☆25Mar 19, 2026Updated last week
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Django middleware and signals for handling security events☆13Apr 14, 2021Updated 4 years ago
- setup wazuh to serve multiple organizations on a single instance.☆11Dec 29, 2023Updated 2 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- Leveraging Yara Rules to Hunt for Abused Telegram Accounts☆15Oct 16, 2019Updated 6 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated 3 weeks ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Jan 23, 2024Updated 2 years ago